Central Monitoring - Round table discussions
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do t...
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions transl...
As more security equipment categories become commoditised, a previously rich source of income for integrators and installers – markup – is becoming harder to come by. Less expensive products with little to no perceptible value differentiation leave integrators with few options, not to mention the growth of pricing transparency that comes courtesy of the Internet. We asked this week’s Expert Panel Roundtable: Given the increase in commoditised hardware (i.e., lower profit margin...
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillanc...
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download